CVE-2018-1000194

A path traversal vulnerability exists in Jenkins 2.120 and older, LTS 2.107.2 and older in FilePath.java, SoloFilePathFilter.java that allows malicious agents to read and write arbitrary files on the Jenkins master, bypassing the agent-to-master security subsystem protection.
Configurations

Configuration 1 (hide)

cpe:2.3:a:jenkins:jenkins:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:a:jenkins:jenkins:*:*:*:*:lts:*:*:*

Configuration 3 (hide)

cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:1.9.0:*:*:*:*:*:*:*

History

13 Jun 2022, 19:03

Type Values Removed Values Added
CPE cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:1.9.0:*:*:*:*:*:*:*
References (MISC) https://www.oracle.com/security-alerts/cpuapr2022.html - (MISC) https://www.oracle.com/security-alerts/cpuapr2022.html - Patch, Third Party Advisory
First Time Oracle
Oracle communications Cloud Native Core Automated Test Suite

20 Apr 2022, 00:15

Type Values Removed Values Added
References
  • (MISC) https://www.oracle.com/security-alerts/cpuapr2022.html -

Information

Published : 2018-06-05 21:29

Updated : 2023-12-10 12:30


NVD link : CVE-2018-1000194

Mitre link : CVE-2018-1000194

CVE.ORG link : CVE-2018-1000194


JSON object : View

Products Affected

oracle

  • communications_cloud_native_core_automated_test_suite

jenkins

  • jenkins
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')